2008 IEEE/ACM International Conference on Computer-Aided Design 2008
DOI: 10.1109/iccad.2008.4681649
|View full text |Cite
|
Sign up to set email alerts
|

Hardware protection and authentication through netlist level obfuscation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 115 publications
(31 citation statements)
references
References 3 publications
0
31
0
Order By: Relevance
“…In details, it is an extended FSM which can be triggered by specific inputs from the designer. In [9] [10] [11], the authors show different hardware obfuscation methods to prevent hardware Trojan insertion and to assist others detection methods. These invasive methods can be difficult to achieve for a complex IC and they can add increase even significantly the cost of the ICs.…”
Section: E Invasive Detection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…In details, it is an extended FSM which can be triggered by specific inputs from the designer. In [9] [10] [11], the authors show different hardware obfuscation methods to prevent hardware Trojan insertion and to assist others detection methods. These invasive methods can be difficult to achieve for a complex IC and they can add increase even significantly the cost of the ICs.…”
Section: E Invasive Detection Techniquesmentioning
confidence: 99%
“…Hardware Trojans prevention techniques consist in applying certain modification to the circuit with the goal of making malicious modification of the hardware a difficult task. Known prevention techniques are: state machine obfuscation [9] or logic encoding [26].…”
Section: Introductionmentioning
confidence: 99%
“…In [20][21] [22], the authors show different hardware obfuscation methods used to prevent hardware Trojan insertion and to assist others detection methods.…”
Section: B Hardware Trojan Detection Techniquesmentioning
confidence: 99%
“…Obfuscation is a technique that transforms a circuit or design into one that is functionally equivalent but is significantly more difficult to reverse engineer [37][38][39]. Thus, more resources and time will be required for an attacker to determine chip functions.…”
Section: Obfuscationmentioning
confidence: 99%